WO2016127436A1 - 数据上载的方法、装置及系统 - Google Patents

数据上载的方法、装置及系统 Download PDF

Info

Publication number
WO2016127436A1
WO2016127436A1 PCT/CN2015/073119 CN2015073119W WO2016127436A1 WO 2016127436 A1 WO2016127436 A1 WO 2016127436A1 CN 2015073119 W CN2015073119 W CN 2015073119W WO 2016127436 A1 WO2016127436 A1 WO 2016127436A1
Authority
WO
WIPO (PCT)
Prior art keywords
vnf package
vnf
user
package
identifier
Prior art date
Application number
PCT/CN2015/073119
Other languages
English (en)
French (fr)
Chinese (zh)
Inventor
刘建宁
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201580002153.2A priority Critical patent/CN106105154B/zh
Priority to BR112017017491A priority patent/BR112017017491A2/pt
Priority to EP15881598.5A priority patent/EP3249882A4/en
Priority to PCT/CN2015/073119 priority patent/WO2016127436A1/zh
Publication of WO2016127436A1 publication Critical patent/WO2016127436A1/zh
Priority to US15/676,122 priority patent/US20170373939A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0895Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

Definitions

  • the present invention relates to the field of network function virtualization, and in particular, to a data uploading method, device and system.
  • NFV Network Function Virtualization
  • IT Information Technology
  • NFV Network Function Virtualization
  • NSD Network Service Descriptor
  • VNF Package virtual network function package
  • the user uploads a Network Service Descriptor (NSD) to the network function virtualization orchestrator (NFV Orchestrator) on the network side, which is also called network service description information.
  • NSD Network Service Descriptor
  • NFV Orchestrator the Network Function Virtualization Orchestrator
  • NS network service
  • the Network Function Virtualization Orchestrator is responsible for orchestrating and managing resources according to the network service (NS) requested by the user, and monitoring the VNF resources and their running status in real time. If the upload is successful, the Network Function Virtualization Choreographer has saved all the VNF Packages required by NSD. Then the NSD upload success confirmation message is returned, and then the user is provided with its network service.
  • the VND Package can return the NSD upload failure message if it can virtualize all the VNF Packages required by the orchestrator to save the network service description information. 2. If the user receives the NSD upload failure message, according to the existing standards, the user needs to upload each VNF Package required by the NSD one by one. During the upload process of each VNF Package, the network function virtualization orchestrator performs user authentication on the upload VNF Package, and if verified, adds the VNF Package to the VNF directory. When all the VNFs described by the NSD are all stored in the VNF directory, the NSD is added to the NSD directory, and an NSD upload success message is sent to the user.
  • the inventor found that at least the following problems exist in the prior art: when the NSD upload fails, the user needs to upload the VNF packages required by the NSD one by one to the network function virtualization orchestrator. User authentication is required each time the VNF Package is uploaded. Thus, for the N VNF packages of the same NSD, multiple repeated authentications are required, and at most N-1 duplicate authentications are generated, resulting in waste of resources.
  • the invention provides a method, a device and a system for uploading data, which are used to solve the problem that a user repeatedly performs identity verification when an NSD upload fails, resulting in waste of resources.
  • the present invention provides a data uploading method, the method is applied to a device that the user is currently logged in, and the user provides a user of the network service NS, the method includes:
  • the query result carries a target VNF Package identifier list, where the target VNF Package identifier list is used to record an identifier of the at least one target VNF Package that is not uploaded;
  • the target VNF Package identifier list is not empty, acquiring the at least one target VNF Package according to the target VNF Package identifier list;
  • the method before the receiving the query result sent by the network function virtualization orchestrator, the method further includes:
  • a second possible implementation of the first aspect is also provided, in the first aspect
  • the second possible implementation manner after the acquiring the at least one target VNF Package according to the target VNF Package identifier list, the method further includes:
  • the present invention provides a method for data uploading, the method application For the network function virtualization orchestrator, the method includes:
  • Target VNF Package identifier list Sending, to the user, a target VNF Package identifier list, where the target VNF Package identifier list is used to record the at least one target VNF Package identifier;
  • Network service package carries network service description information NSD of the network service, at least one target VNF Package corresponding to the at least one target VNF Package identifier, and an authentication file;
  • the method before the searching for the all VNF Package identifiers, the at least one target VNF Package identifier in the VNF directory is not recorded, the method also includes:
  • the second query request carries all VNF Package identifiers required by the network service and at least one VNF Package version number, and each VNF Package version number corresponds to a VNF Package identifier;
  • the at least one target VNF Package identifier that is not recorded in the VNF directory includes:
  • VNF Package identifier and the VNF Package version number are not found in the entire VNF Package identifier, and at least one target VNF Package identifier is not recorded in the VNF directory.
  • the method before the searching for the all VNF Package identifiers, the at least one target VNF Package identifier in the VNF directory is not recorded, the method also includes:
  • At least one target VNF Package identifier which also includes:
  • the method before the searching for the entire VNF Package identifier, the at least one target VNF Package identifier in the VNF directory is not recorded, the method also includes:
  • the fourth query request carries all VNF Package identifiers required by the network service, at least one VNF Package version number, and a user identifier of the user;
  • the VNF Package identifier and the VNF Package version number are not found in the VNF Package identifier, and at least one target VNF Package identifier is not recorded in the VNF directory.
  • the network service package further carries an authentication policy file, where the verification policy file is used by the network function virtualization orchestrator to determine how to The integrity and authenticity of the VNF Package are verified.
  • the method further includes:
  • verification policy file If the verification policy file is not carried in the network service package, verify the integrity and authenticity of all VNF Packages and the NSD, the integrity indicating whether the program carried in the VNF Package is complete, Authenticity indicates whether the function of the program carried in the VNF Package is consistent with that described in the virtual network function package description information VNFD;
  • the NSD is added to the NSD directory when all of the VNF packages described by the NSD are all added to the VNF directory.
  • the present invention further provides a device for uploading data, the device is located in a device that the user is currently logged in, and the user is a user who requests the network service NS, the device includes:
  • a sending unit configured to send a first query request to the network function virtualization orchestrator NFV Orchestrator, where the query request carries all virtual network function package VNF Package identifiers required by the network service;
  • a receiving unit configured to receive a query result sent by the network function virtualization orchestrator, where the query result carries a target VNF Package identifier list, where the target VNF Package identifier list is used to record at least one target VNF Package that is not uploaded Identification
  • An acquiring unit configured to acquire the at least one target VNF Package according to the target VNF Package identifier list when the target VNF Package identifier list received by the receiving unit is not empty;
  • the sending unit is further configured to encapsulate the network service description information NSD of the network service, the at least one target VNF Package acquired by the acquiring unit, and an authentication file, and send the network function to the virtualized orchestration
  • the authentication file is used to verify the validity of the user's identity.
  • the sending unit is further configured to:
  • the sending unit is further configured to: encapsulate the NSD of the network service, the at least one target VNF Package, an authentication file, and an authentication policy file, and send the network policy to the network A functional virtualization orchestrator for the network function virtualization orchestrator to determine how to verify the integrity and authenticity of the VNF Package.
  • the present invention further provides an apparatus for uploading data, the apparatus being located in a network function virtualization orchestrator, the apparatus comprising:
  • a receiving unit configured to receive a first query request sent by the user, where the query request carries all VNF Package identifiers required by the network service requested by the user;
  • a searching unit configured to search for at least one target VNF Package identifier that is not recorded in the VNF directory in the entire VNF Package identifier received by the receiving unit;
  • a sending unit configured to send a target VNF Package identifier list to the user, where the target VNF Package identifier list is used to record the at least one target VNF Package identifier found by the searching unit;
  • the receiving unit is further configured to receive a network service package sent by the user, where the network service package carries network service description information NSD of the network service, and at least one target corresponding to the at least one target VNF Package identifier VNF Package and authentication file;
  • a verification unit configured to perform identity verification on the user according to the identity verification file received by the receiving unit
  • an uploading unit configured to complete the uploading process of each target VNF Package in sequence when the verification unit is successfully verified.
  • the receiving unit is further configured to:
  • the second query request carries all VNF Package identifiers required by the network service and at least one VNF Package version number, and each VNF Package version number corresponds to a VNF Package identifier;
  • the searching unit is further configured to:
  • VNF Package identifier and the VNF Package version number are not found in the entire VNF Package identifier, and at least one target VNF Package identifier is not recorded in the VNF directory.
  • the receiving unit is further configured to receive a third query request sent by a user, where the third query request carries the network service All required VNF Package IDs and user IDs of the users;
  • the verification unit is further configured to: determine, according to the user identifier received by the receiving unit, whether the user has a query authority;
  • the searching unit is further configured to: when the verification unit verifies the query authority, search for at least one target VNF Package identifier in the VNF Package identifier that is not recorded in the VNF directory.
  • the sending unit is further configured to receive a fourth query request sent by a user, where the fourth query request carries the network service All required VNF Package IDs, at least one VNF Package version number, and the user ID of the user;
  • the verification unit is further configured to: determine, according to the user identifier, whether the user has query permission;
  • the searching unit is further configured to: when the verification unit verifies the query permission, search for the VNF Package identifier, the VNF Package identifier, and the VNF.
  • the package version number is not recorded in at least one target VNF Package ID in the VNF directory.
  • the network service package further carries an authentication policy file, where the verification policy file is used by the network function virtualization orchestrator to determine how to The integrity and authenticity of the VNF Package are verified, and the verification unit is further configured to:
  • verification policy file If the verification policy file is not carried in the network service package, verify the integrity and authenticity of all VNF Packages and the NSD, the integrity indicating whether the program carried in the VNF Package is complete, Authenticity indicates whether the function of the program carried in the VNF Package is consistent with that described in the virtual network function package description information VNFD;
  • the uploading unit is specifically configured to:
  • the NSD is added to the NSD directory when all of the VNF packages described by the NSD are all added to the VNF directory.
  • the present invention provides a system for data uploading, the system comprising the apparatus of the third aspect and the apparatus of the fourth aspect.
  • the present invention further provides a device for uploading data, the device is located in a device that the user is currently logged in, and the user is a user who requests the network service NS, the device includes:
  • a transmitter configured to send a first query request to the network function virtualization orchestrator NFV Orchestrator, the query request carrying all virtual networks required by the network service Feature Pack VNF Package ID;
  • a receiver configured to receive a query result sent by the network function virtualization orchestrator, where the query result carries a target VNF Package identifier list, where the target VNF Package identifier list is used to record at least one target VNF Package that is not uploaded.
  • a processor configured to: when the target VNF Package identifier list received by the receiver is not empty, acquire the at least one target VNF Package according to the target VNF Package identifier list;
  • the transmitter is further configured to encapsulate and send the network service description information NSD of the network service, the at least one target VNF Package acquired by the processor, and an authentication file to the network function virtualization orchestration
  • the authentication file is used to verify the validity of the user's identity.
  • the transmitter is further configured to:
  • the transmitter is further configured to: use the NSD of the network service, the at least one target VNF Package, an authentication file, and
  • the verification policy file is encapsulated and sent to the network function virtualization orchestrator, the verification policy file being used by the network function virtualization orchestrator to determine how to verify the integrity and authenticity of the VNF Package.
  • the present invention further provides an apparatus for uploading data, the apparatus being located in a network function virtualization orchestrator, the apparatus comprising:
  • a receiver configured to receive a first query request sent by the user, where the query request carries all VNF Package identifiers required by the network service requested by the user;
  • a processor configured to search for at least one target VNF Package identifier that is not recorded in the VNF directory of the all VNF Package identifiers received by the receiver;
  • a transmitter configured to send a target VNF Package identifier list to the user, where the target VNF Package identifier list is used to record the at least one target VNF Package identifier found by the processor;
  • the receiver is further configured to receive a network service package sent by the user, where the network service package carries network service description information NSD of the network service, and at least one target corresponding to the at least one target VNF Package identifier VNF Package and authentication file;
  • the processor is further configured to perform identity verification on the user according to the identity verification file received by the receiver;
  • the receiver is further configured to:
  • the second query request carries all VNF Package identifiers required by the network service and at least one VNF Package version number, and each VNF Package version number corresponds to a VNF Package identifier;
  • the processor is further configured to:
  • VNF Package identifier and the VNF Package version number are not found in the entire VNF Package identifier, and at least one target VNF Package identifier is not recorded in the VNF directory.
  • the receiver is further configured to receive a third query request sent by a user, where the third query request is Carrying all VNF Package identifiers required by the network service and user identifiers of the users;
  • the processor is further configured to determine, according to the user identifier received by the receiver, whether the user has query permission;
  • At least one target VNF Package identifier that is not recorded in the VNF directory in the entire VNF Package identifier is searched.
  • the transmitter is further configured to receive a fourth query request sent by a user, where the fourth query request carries the network service All required VNF Package IDs, at least one VNF Package version number, and the user ID of the user;
  • the processor is further configured to: determine, according to the user identifier, whether the user has query permission;
  • the VNF Package identifier and the VNF Package version number are not found in the VNF Package identifier, and at least one target VNF Package identifier is not recorded in the VNF directory.
  • the network service package further carries an authentication policy file, where the verification policy file is used by the network function virtualization orchestrator to determine how to The integrity and authenticity of the VNF Package is verified, and the processor is further configured to:
  • verification policy file If the verification policy file is not carried in the network service package, verify the integrity and authenticity of all VNF Packages and the NSD, the integrity indicating whether the program carried in the VNF Package is complete, Authenticity indicates whether the function of the program carried in the VNF Package is consistent with that described in the virtual network function package description information VNFD;
  • the NSD is added to the NSD directory when all of the VNF packages described by the NSD are all added to the VNF directory.
  • the present invention provides a system for data uploading, the system comprising the apparatus of the sixth aspect and the apparatus of the seventh aspect.
  • the method, device and system for uploading data provided by the present invention first determine the missing VNF Package by querying, and therefore do not send duplicate VNF Packages to the network function virtualization orchestrator, thereby saving resources.
  • the missing at least one VNF Package is encapsulated with the NSD and the authentication file and sent to the Network Function Virtualization Orchestrator.
  • the network function virtualization orchestrator can determine the legality of the senders of the N VNF packages by one identity verification, thereby avoiding duplicate identity verification and improving resource utilization.
  • FIG. 1 is a flowchart of a method for uploading a first data in an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for uploading a second data in an embodiment of the present invention
  • FIG. 3 is a flowchart of a method for uploading a third data in an embodiment of the present invention.
  • FIG. 4 is a flowchart of a method for uploading a fourth data in an embodiment of the present invention.
  • FIG. 5 is a flowchart of a fifth data uploading method according to an embodiment of the present invention.
  • FIG. 6 is a flowchart of a sixth data uploading method according to an embodiment of the present invention.
  • FIG. 7 is a flowchart of a seventh data uploading method in an embodiment of the present invention.
  • FIG. 8 is a flowchart of a method for uploading an eighth data in an embodiment of the present invention.
  • FIG. 9 is a flowchart of a method for uploading a ninth data in an embodiment of the present invention.
  • FIG. 10 is a flowchart of a method for uploading a tenth data according to an embodiment of the present invention
  • FIG. 11 is a flowchart of a method for eleventh data upload in an embodiment of the present invention.
  • FIG. 12 is a schematic structural diagram of an apparatus for uploading a first data in an embodiment of the present invention.
  • FIG. 13 is a schematic structural diagram of an apparatus for uploading a second data according to an embodiment of the present invention.
  • FIG. 14 is a schematic structural diagram of an apparatus for uploading a third data in an embodiment of the present invention.
  • 15 is a schematic diagram of a system for uploading a first data in an embodiment of the present invention.
  • 16 is a schematic structural diagram of an apparatus for uploading a fourth data in an embodiment of the present invention.
  • FIG. 17 is a schematic structural diagram of an apparatus for uploading a fifth data in an embodiment of the present invention.
  • FIG. 18 is a schematic diagram of a second data uploading system in an embodiment of the present invention.
  • An embodiment of the present invention provides a data uploading method, where the method is applied to a device currently logged in by a user, and the user provides a user who provides a network service NS.
  • the user is a client or node that communicates with the network function virtualization orchestrator NFV Orchestrator, and can usually be an operation support system/base station subsystem (OSS/BSS), a vendor Vendor, a network service design vendor, etc., as shown in FIG. , the method includes:
  • Step 101 Send a first query request to the network function virtualization orchestrator NFV Orchestrator, where the query request carries all virtual network function package VNF Package identifiers required by the network service.
  • the query request is divided into the first according to the difference of the content carried by the query request.
  • a query request, a second query request, a third query request, and a fourth query request each query request carries all virtual network function package VNF Package identifiers required by the network service.
  • One implementation of the query request is: VNF Package List Query Request VNF Packagelist query request. Only the first query request is introduced here, and the second query request, the third query request, and the fourth query request are described in detail later.
  • the device currently logged in by the user has the function of sending the NSD to the network function virtualization orchestrator and acquiring all the VNF Packages and VNF Package identifiers required by the NSD.
  • the VNF Package ID can be obtained through a local preset database, obtained through the network, or imported manually.
  • Step 102 Receive a query result sent by the network function virtualization orchestrator, where the query result carries a target VNF Package identifier list, where the target VNF Package identifier list is used to record an identifier of at least one target VNF Package that is not uploaded.
  • the query result is a list query response list query Ack (Acknowledgement).
  • the query result carries a target VNF Package identifier list, and the target VNF Package identifier list is used to record the identifier of at least one VNF Package that is not uploaded to the network function virtualization orchestrator, that is, the identifier of the VNF Package that needs to be supplemented by the user.
  • Step 103 If the target VNF Package identifier list is not empty, obtain the at least one target VNF Package according to the target VNF Package identifier list.
  • the target VNF Package identifier list is not empty, it indicates that the network function virtualization orchestrator also needs the target VNF Package recorded in the target VNF Package identifier list to provide the user with the requested network service.
  • the device currently logged in by the user acquires each target VNF Package in the at least one target VNF Package one by one by reading locally or by means of network acquisition and manual import.
  • the priority is sequentially local read, acquired through the network, and manually imported. If the VNF Package cannot be obtained through local read and network acquisition, the device currently logged in by the user outputs prompt information for manual import.
  • Step 104 Encapsulate and send the network service description information NSD of the network service, the at least one target VNF Package, and an authentication file to the network function virtualization orchestrator, where the identity verification file is used for verification The legality of the user's identity.
  • the present invention refers to the encapsulated package as a network service package.
  • the authentication file is an authentication file commonly used in the prior art. For details, refer to the definition of the authentication file and the usage method in the prior art. Generally, the authentication file carries one of a user identifier, a certificate, and a key for authenticity verification of the identity.
  • the network service description information NSD is all elements required in the prior art for describing the NS, including information such as VNF Descriptor (VNFD) of each VNF Package. For details, refer to the definition of NSD in the prior art.
  • the data uploading method provided by the embodiment of the present invention obtains at least one target VNF Package for providing a network service in the network function virtualization orchestrator by using a query request before sending the NSD to the network function virtualization orchestrator (missing VNF Package) And then, the at least one target VNF Package and the NSD and the authentication file are encapsulated and sent to the network function virtualization orchestrator, so that one or more target VNF packages are sent in one transmission process, so that the network function is virtualized.
  • the orchestrator authenticates the network service package sent this time, and can upload at least one target VNF package encapsulated in the network service package, avoiding duplicate authentication and improving resource utilization.
  • the first query request carries only all the VNF Package identifiers required by the network service. However, in some scenarios, the same VNF Package has multiple versions (such as V1.0, V2.0, etc.). At this time, if the network function virtualization orchestrator stores V1.0 and the user requests V2.0, it is impossible to distinguish different versions of the VNF package based only on the VNF Package identifier. Based on this, as a further description of the method shown in FIG. 1, the embodiment of the present invention further provides a data uploading method. As shown in FIG. 2, in step 102, receiving a query sent by the network function virtualization orchestrator. Before the result, the method further includes:
  • Step 101a Send a second query request to the network function virtualization orchestrator, where the second query request carries all VNF Package identifiers required by the network service and at least one VNF Package version number, and each VNF Package version number corresponds to a VNF Package ID.
  • the second query request is used to replace the first query request.
  • VNF Package identifier itself has information for distinguishing different versions, it can be used as an alternative to the embodiment of the present invention. For example, add a version field at the end of the VNF Package ID, and then include the version number in the VNF Package ID.
  • the data uploading method provided by the embodiment of the present invention can send a query request carrying the VNF Package version number to the network function virtualization orchestrator through the second query request, thereby distinguishing different versions of the VNF package, and adding the VNF Package.
  • Query dimensions Improved lookup accuracy in scenarios with different versions of the VNF Package.
  • the network function virtualization orchestrator responds as long as the user identity is legal, as long as the device currently logged in by the user sends the first query request to the network function virtualization orchestrator.
  • the embodiment of the present invention further provides a data uploading method. As a further description of the method shown in FIG. 1, as shown in FIG. 3, in step 102, receiving a query sent by the network function virtualization orchestrator. Before the result, the method further includes:
  • Step 101b Send a third query request to the network function virtualization orchestrator, where the third query request carries all VNF Package identifiers required by the network service and a user identifier of the user.
  • the third query request is an alternative to the first query request, and the third query request carries the user identifier in addition to all the VNF Package identifiers required for the network service.
  • User IDs are used to identify users, and each user has a unique user ID.
  • the network function virtualization orchestrator can authenticate the user based on the user ID. Respond to the query request if it passes validation. Otherwise, if the verification fails, the feedback is verified. A failure message, the notification cancels the response to the query request.
  • the data uploading method provided by the embodiment of the present invention carries the user identifier that uniquely identifies the user in the third query request, so that the network function virtualization orchestrator verifies the user according to the user identifier, thereby improving the security of the target VNF Package identifier query. Sex.
  • the query request may carry the VNF Package version number and the user identifier at the same time.
  • the embodiment of the present invention further provides a data uploading method. As shown in FIG. 4, in step 102, receiving the network function virtual Before the query result sent by the orchestration device, the method further includes:
  • Step 101c Send a fourth query request to the network function virtualization orchestrator, where the fourth query request carries all VNF Package identifiers required by the network service, the at least one VNF Package version number, and the user of the user. logo.
  • the fourth query request includes the VNF Package version number carried in the second query request and the user identifier carried in the third query request, thereby achieving the dual effects of improving the search accuracy and improving the query security.
  • the embodiment of the present invention further provides a solution for further enhancing data transmission security.
  • step 103 if the target VNF Package identifier list is not empty, according to the target VNF Package identifier. After the list obtains the at least one target VNF Package, as shown in FIG. 5, the method further includes:
  • Step 104' encapsulating and transmitting the NSD of the network service, the at least one target VNF Package, an authentication file, and an authentication policy file to the network function virtualization orchestrator, where the verification policy file is used for The network function virtualization orchestrator determines how to verify the integrity and authenticity of the VNF Package.
  • the verification policy file is used to document how the integrity and authenticity of the target VNF Package is detected.
  • the integrity indicates whether the program carried in the VNF Package is complete, and the authenticity indicates whether the function of the program carried in the VNF Package is consistent with that described in the virtual network function package description information VNFD.
  • the data uploading method provided by the embodiment of the present invention can add a verification policy file to the network service package, and then verify the completeness and authenticity of the VNF Package on the basis of verifying the identity of the user, thereby improving the network service. stability.
  • An embodiment of the present invention further provides a data uploading method, where the method is applied to a network.
  • the network function virtualization orchestrator as shown in FIG. 6, the method includes:
  • Step 201 Receive a first query request sent by a user, where the query request carries all VNF Package identifiers required by the network service requested by the user.
  • Step 202 Search for at least one target VNF Package identifier that is not recorded in the VNF directory in the entire VNF Package identifier.
  • the network function virtualization orchestrator stores the VNF directory.
  • the network function virtualization orchestrator stores the VNF Packag identifier in the VNF directory, or stores the function corresponding to the VNF Packag identifier. Go to the VNF directory.
  • the VNF Packag logo is used to uniquely identify the VNF Packag and each VNF Packag corresponds to a feature.
  • the VNF Package ID is stored in the VNF directory, it is uploaded on behalf of the VNF Package.
  • VNF Package IDs from the first query request, and sequentially read a VNF Package ID.
  • the read VNF Package identifier is the target VNF Package identifier, and the read VNF Package identifier is added to the target VNF Package identifier list. If found, the next VNF Package identifier in the entire VNF Package identifier is read, and it is determined whether the next VNF Package identifier exists in the VNF directory. Finally, a list of target VNF Package identifiers consisting of at least one target VNF Package identifier found is formed.
  • Step 203 Send a target VNF Package identifier list to the user, where the target VNF Package identifier list is used to record the at least one target VNF Package identifier.
  • the VNF Package identification list is sent to the user via a reply message ACK.
  • Step 204 Receive a network service package sent by the user, where the network service package carries network service description information NSD of the network service, at least one target VNF Package corresponding to the at least one target VNF Package identifier, and identity verification. file.
  • Step 205 Perform identity verification on the user according to the identity verification file.
  • This step can refer to the specific definition of the authentication file in the prior art and the authentication method according to the authentication file.
  • Step 206 If the verification is successful, the uploading process of each target VNF Package is completed in sequence.
  • step 206 can be implemented in the following manner:
  • Step 301 Add each target VNF Package to the VNF directory in turn and send the image carried in the VNF to a Virtualized Infrastructure Manager (VIM).
  • VIP Virtualized Infrastructure Manager
  • the Virtual Infrastructure Manager is responsible for managing, allocating, and maintaining an image of the NFV.
  • Step 302 Add the NSD to the NSD directory when all the VNF packages described by the NSD are all added to the VNF directory.
  • NSD describes all the VNF packages required for network services. When all the VNF Packages required by the network service are listed in the VNF directory, it indicates that the user can provide the requested network service. In addition, check the necessary conditions for providing network services, for example, check whether the external interface of the VNF required by the network is in the VNF description information. If both conditions are met, the NSD is added to the NSD directory.
  • the data uploading method provided by the embodiment of the present invention can provide the user with a target VNF Package identifier list according to the query request sent by the user, so that the user only needs to provide the missing VNF Package.
  • the network service package sent by the user is decapsulated, and the identity verification file carried in the network service package is verified to determine the legality of the user. Then, at least one target VNF Package carried in the network service package is uploaded. Realize the uploading of at least one VNF Package by one verification, saving resources.
  • the embodiment of the present invention further provides a data uploading method.
  • step 202 searching for all the VNF Package identifiers, at least one of the VNF directories is not recorded.
  • the method further includes:
  • Step 401 Receive a second query request sent by the user, where the second query request carries all VNF Package identifiers required by the network service and at least one VNF Package version number, and each VNF Package version number corresponds to a VNF Package identifier. ;
  • Step 202 Searching for all the VNF Package identifiers, not recorded in the VNF At least one target VNF Package identifier in the directory, specifically including:
  • Step 402 Search for at least one target VNF Package identifier in the VNF directory that is not recorded in the VNF Package identifier and the VNF Package identifier.
  • VNF Package ID is configured with a version number
  • the VNF Package ID is required and the version number is also recorded in the VNF directory.
  • the VNF directory adds a version number attribute to each VNF Package ID.
  • VNF Package identifier is configured with the corresponding version number in the query request, it is determined whether the VNF Package identifier is recorded in the VNF directory. If the VNF Package identifier is recorded in the VNF directory, the VNF Package identifier corresponding to the VNF Package is further determined. Whether it is consistent with the version number recorded in the directory. If the VNF Package identifier is recorded in the VNF directory or the VNF Package version number does not match the version number recorded in the directory, the VNF Package identifier is determined as the target VNF Package identifier, and the next VNF Package identifier in the query request is read.
  • VNF Package ID in the query request is not configured with the corresponding version number, that is, only the VNF Package identifier, only the VNF Package identifier is recorded in the VNF directory. If the VNF Package ID is not recorded in the VNF Directory, the VNF Package ID is determined as the target VNF Package ID and the next VNF Package ID in the query request is read. If the VNF Package ID is recorded in the VNF directory, the next VNF Package ID in the query request is read.
  • the network function virtualization orchestrator may also determine the version number of the VNF Package according to the VNF Package identifier.
  • the network function virtualization orchestrator can distinguish different versions of the VNF Package according to the accepted query request carrying the VNF Package version number, and increase the query dimension of the VNF Package. Improved lookup accuracy in scenarios with different versions of the VNF Package.
  • the embodiment of the present invention further provides a data uploading method.
  • step 202 in the searching for the entire VNF Package identifier, it is not recorded in the VNF directory.
  • At least one target VNF Package identifier The method further includes:
  • Step 501 Send a third query request to the network function virtualization orchestrator, where the second query request carries all VNF Package identifiers required by the network service and a user identifier of the user.
  • Step 502 Determine, according to the user identifier, whether the user has query permission.
  • Step 202 Search for at least one target VNF Package identifier that is not recorded in the VNF directory in the all VNF Package identifiers, and further includes:
  • Step 503 If there is the query permission, search for at least one target VNF Package identifier in the VNF Package identifier that is not recorded in the VNF directory.
  • the data uploading method provided by the embodiment of the present invention carries the user identifier that uniquely identifies the user in the third query request, so that the network function virtualization orchestrator verifies the user according to the user identifier, thereby improving the security of the target VNF Package identifier query. Sex.
  • the embodiment of the present invention further provides a data uploading method.
  • step 202 searching for all the VNF Package identifiers, at least one of the VNF directories is not recorded.
  • the method further includes:
  • Step 601 Send a fourth query request to the network function virtualization orchestrator, where the fourth query request carries all VNF Package identifiers required by the network service, at least one VNF Package version number, and a user identifier of the user.
  • Step 602 Determine, according to the user identifier, whether the user has query permission.
  • Step 202 Search for at least one target VNF Package identifier that is not recorded in the VNF directory in the all VNF Package identifiers, and further includes:
  • Step 603 If there is the query authority, search for at least one target VNF Package identifier of the VNF Package identifier, the VNF Package identifier and the VNF Package version number not recorded in the VNF directory.
  • the embodiment of the present invention further provides a data uploading method, which can improve the search accuracy and improve the query security.
  • the embodiment of the present invention further provides a data uploading method.
  • the network service package further carries an authentication policy file, where the verification policy file is used by the network function virtualization orchestrator. Determine how to apply to the VNF Package The integrity and authenticity are verified.
  • the method further includes:
  • Step 700 Determine whether the verification policy file is carried in the network service package.
  • Step 701 If the verification policy file is not carried in the network service package, verify the integrity and authenticity of all the VNF packages and the NSD.
  • the integrity indicates whether the program carried in the VNF Package is complete, and the authenticity indicates whether the function of the program carried in the VNF Package is consistent with the description in the virtual network function package description information VNFD.
  • Step 702 If the network service package carries the verification policy file, parse the verification policy file to determine a verification policy.
  • the verification policy includes:
  • verification policies can be recorded in the verification policy file to verify for different scenarios.
  • the specific content of the verification strategy can be determined by a person skilled in the art according to actual needs.
  • the embodiment of the present invention further provides a device for uploading data, the device is located in a device that the user is currently logged in, and the user is a user who requests the network service NS. As shown in FIG. 12, the device includes:
  • the sending unit 1201 is configured to send a first query request to the network function virtualization orchestrator NFV Orchestrator, where the query request carries all virtual network function package VNF Package identifiers required by the network service;
  • the receiving unit 1202 is configured to receive a query result sent by the network function virtualization orchestrator, where the query result carries a target VNF Package identifier list, where the target VNF Package identifier list is used to record at least one target VNF Package that is not uploaded. Identification
  • the obtaining unit 1203 is configured to: when the target VNF Package identifier list received by the receiving unit 1202 is not empty, acquire the at least one target VNF Package according to the target VNF Package identifier list;
  • the sending unit 1201 is further configured to encapsulate the network service description information NSD of the network service, the at least one target VNF Package acquired by the obtaining unit 1203, and an authentication file, and send the network function virtual The organizer is used for verifying the legality of the user's identity.
  • the sending unit 1201 is further configured to:
  • the sending unit 1201 is further configured to: encapsulate the NSD of the network service, the at least one target VNF Package, an authentication file, and an authentication policy file, and send the file to the network function virtualization orchestrator,
  • the verification policy file is used by the network function virtualization orchestrator to determine how to verify the integrity and authenticity of the VNF Package.
  • the embodiment of the present invention further provides a device for uploading data, where the device is located in a network function virtualization orchestrator, as shown in FIG.
  • the receiving unit 1301 is configured to receive a first query request sent by the user, where the query request carries all VNF Package identifiers required by the network service requested by the user;
  • the searching unit 1302 is configured to search for at least one target VNF Package identifier that is not recorded in the VNF directory in the all VNF Package identifiers received by the receiving unit 1301;
  • a sending unit 1303, configured to send a target VNF Package identifier column to the user a table, the target VNF Package identifier list is used to record the at least one target VNF Package identifier found by the searching unit 1302;
  • the receiving unit 1301 is further configured to receive a network service package sent by the user, where the network service package carries at least one of network service description information NSD of the network service and the at least one target VNF Package identifier. Target VNF Package and authentication file;
  • the verification unit 1304 is configured to perform identity verification on the user according to the identity verification file received by the receiving unit 1301.
  • the uploading unit 1305 is configured to complete the uploading process of each target VNF Package in sequence when the verification unit 1304 is successfully verified.
  • the receiving unit 1301 is further configured to:
  • the second query request carries all VNF Package identifiers required by the network service and at least one VNF Package version number, and each VNF Package version number corresponds to a VNF Package identifier;
  • the searching unit 1302 is further configured to:
  • VNF Package identifier and the VNF Package version number are not found in the entire VNF Package identifier, and at least one target VNF Package identifier is not recorded in the VNF directory.
  • the receiving unit 1301 is further configured to: receive a third query request sent by the user, where the third query request carries all VNF Package identifiers required by the network service, and the user User ID;
  • the verification unit 1304 is further configured to determine, according to the user identifier received by the receiving unit 1301, whether the user has a query authority;
  • the searching unit 1302 is further configured to: when the verification unit 1304 verifies the query authority, search for at least one target VNF Package identifier in the VNF Package identifier that is not recorded in the VNF directory.
  • the sending unit 1303 is further configured to: receive a fourth query request sent by the user, where the fourth query request carries all VNF Package identifiers required by the network service, at least one VNF Package version number, and the User's user ID;
  • the verification unit 1304 is further configured to determine, according to the user identifier, whether the user is Have query permission;
  • the searching unit 1302 is further configured to: when the verification unit 1304 verifies the query permission, search for at least one target of the VNF Package identifier, the VNF Package identifier, and the VNF Package version number not recorded in the VNF directory. VNF Package ID.
  • the network service package further carries an authentication policy file, where the verification policy file is used by the network function virtualization orchestrator to determine how to verify the integrity and authenticity of the VNF Package, the verification unit 1304 is also used to:
  • verification policy file If the verification policy file is not carried in the network service package, verify the integrity and authenticity of all VNF Packages and the NSD, the integrity indicating whether the program carried in the VNF Package is complete, Authenticity indicates whether the function of the program carried in the VNF Package is consistent with that described in the virtual network function package description information VNFD;
  • the verification policy file is carried in the network service package, the verification policy file is parsed to determine a verification policy, where the verification policy includes:
  • the uploading unit 1305 is specifically configured to:
  • the NSD is added to the NSD directory when all of the VNF packages described by the NSD are all added to the VNF directory.
  • the embodiment of the present invention further provides a system for uploading data.
  • the system is composed of a device 1501 (such as the device shown in FIG. 12) and a network function virtualization orchestrator 1502 (FIG. 13 or The device shown in Figure 14 consists of.
  • the network function virtualization orchestrator 1502 is connected to the virtual infrastructure manager VIM1503.
  • the embodiment of the present invention further provides a device for uploading data, the device is located in a device that the user is currently logged in, and the user is a user who requests the network service NS.
  • the device includes:
  • a transmitter 1601 configured to send a first query request to the network function virtualization orchestrator NFV Orchestrator, where the query request carries all virtual network function package VNF Package identifiers required by the network service;
  • the receiver 1602 is configured to receive a query result sent by the network function virtualization orchestrator, where the query result carries a target VNF Package identifier list, where the target VNF Package identifier list is used to record at least one target VNF Package that is not uploaded. Identification
  • the processor 1603 is configured to: when the target VNF Package identifier list received by the receiver 1602 is not empty, acquire the at least one target VNF Package according to the target VNF Package identifier list;
  • the transmitter 1601 is further configured to encapsulate the network service description information NSD of the network service, the at least one target VNF Package acquired by the processor 1603, and an authentication file, and send the virtual function to the network function virtual
  • the organizer is used for verifying the legality of the user's identity.
  • the transmitter 1601 is further configured to:
  • the transmitter 1601 is further configured to encapsulate and send the NSD of the network service, the at least one target VNF Package, an authentication file, and a verification policy file to the network function virtualization orchestrator,
  • the verification policy file is used in the The network function virtualization orchestrator determines how to verify the integrity and authenticity of the VNF Package.
  • An embodiment of the present invention provides a device for uploading data, where the device is located in a network function virtualization orchestrator, as shown in FIG.
  • the receiver 1701 is configured to receive a first query request sent by the user, where the query request carries all VNF Package identifiers required by the network service requested by the user;
  • the processor 1702 is configured to search for at least one target VNF Package identifier that is not recorded in the VNF directory of the all VNF Package identifiers received by the receiver 1701;
  • a transmitter 1703 configured to send, to the user, a target VNF Package identifier list, where the target VNF Package identifier list is used to record the at least one target VNF Package identifier found by the processor 1702;
  • the receiver 1701 is further configured to receive a network service package sent by the user, where the network service package carries at least one of network service description information NSD of the network service and the at least one target VNF Package identifier. Target VNF Package and authentication file;
  • the processor 1702 is further configured to perform identity verification on the user according to the identity verification file received by the receiver 1701.
  • receiver 1701 is further configured to:
  • the second query request carries all VNF Package identifiers required by the network service and at least one VNF Package version number, and each VNF Package version number corresponds to a VNF Package identifier;
  • the processor 1702 is further configured to:
  • VNF Package identifier and the VNF Package version number are not found in the entire VNF Package identifier, and at least one target VNF Package identifier is not recorded in the VNF directory.
  • the receiver 1701 is further configured to receive a third query request sent by the user, where the third query request carries all VNF Package identifiers required by the network service and a user identifier of the user;
  • the processor 1702 is further configured to determine, according to the user identifier received by the receiver 1701, whether the user has a query right;
  • At least one target VNF Package identifier that is not recorded in the VNF directory in the entire VNF Package identifier is searched.
  • the transmitter 1703 is further configured to: receive a fourth query request sent by the user, where the fourth query request carries all VNF Package identifiers required by the network service, at least one VNF Package version number, and the User's user ID;
  • the processor 1702 is further configured to: determine, according to the user identifier, whether the user has query permission;
  • the VNF Package identifier and the VNF Package version number are not found in the VNF Package identifier, and at least one target VNF Package identifier is not recorded in the VNF directory.
  • the network service package further carries an authentication policy file, where the verification policy file is used by the network function virtualization orchestrator to determine how to verify the integrity and authenticity of the VNF Package, the processor 1702 is also used to:
  • verification policy file If the verification policy file is not carried in the network service package, verify the integrity and authenticity of all VNF Packages and the NSD, the integrity indicating whether the program carried in the VNF Package is complete, Authenticity indicates whether the function of the program carried in the VNF Package is consistent with that described in the virtual network function package description information VNFD;
  • the verification policy file is carried in the network service package, the verification policy file is parsed to determine a verification policy, where the verification policy includes:
  • processor 1702 is further configured to:
  • the NSD is added to the NSD directory when all of the VNF packages described by the NSD are all added to the VNF directory.
  • the embodiment of the present invention further provides a system for uploading data.
  • the system is composed of a device 1801 (such as the device shown in FIG. 16) and a network function virtualization orchestrator 1802 (FIG. 17) that the user is currently logged into. The device shown).
  • the network function virtualization orchestrator 1802 is connected to the virtual infrastructure manager VIM1803.
  • the present invention can be implemented by means of software plus necessary general hardware, and of course, by hardware, but in many cases, the former is a better implementation. .
  • the technical solution of the present invention which is essential or contributes to the prior art, can be embodied in the form of a software product stored in a readable storage medium, such as a floppy disk of a computer.
  • a hard disk or optical disk, etc. includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)
PCT/CN2015/073119 2015-02-15 2015-02-15 数据上载的方法、装置及系统 WO2016127436A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CN201580002153.2A CN106105154B (zh) 2015-02-15 2015-02-15 数据上载的方法、装置及系统
BR112017017491A BR112017017491A2 (pt) 2015-02-15 2015-02-15 método, aparelho e sistema de carregamento de dados
EP15881598.5A EP3249882A4 (en) 2015-02-15 2015-02-15 Data uploading method, device and system
PCT/CN2015/073119 WO2016127436A1 (zh) 2015-02-15 2015-02-15 数据上载的方法、装置及系统
US15/676,122 US20170373939A1 (en) 2015-02-15 2017-08-14 Data uploading method, apparatus, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/073119 WO2016127436A1 (zh) 2015-02-15 2015-02-15 数据上载的方法、装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/676,122 Continuation US20170373939A1 (en) 2015-02-15 2017-08-14 Data uploading method, apparatus, and system

Publications (1)

Publication Number Publication Date
WO2016127436A1 true WO2016127436A1 (zh) 2016-08-18

Family

ID=56614084

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/073119 WO2016127436A1 (zh) 2015-02-15 2015-02-15 数据上载的方法、装置及系统

Country Status (5)

Country Link
US (1) US20170373939A1 (pt)
EP (1) EP3249882A4 (pt)
CN (1) CN106105154B (pt)
BR (1) BR112017017491A2 (pt)
WO (1) WO2016127436A1 (pt)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019029327A1 (zh) * 2017-08-08 2019-02-14 华为技术有限公司 网络功能服务的发现方法及设备
US20200313981A1 (en) * 2017-09-29 2020-10-01 Orange Method and device for processing a network service instantiation request

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11271948B2 (en) * 2017-05-22 2022-03-08 Amdocs Development Limited System, method, and computer program for verifying virtual network function (VNF) package and/or network service definition integrity
US10700946B2 (en) * 2017-08-08 2020-06-30 Amdocs Development Limited System, method, and computer program for automatically certifying a virtual network function (VNF) for use in a network function virtualization (NFV) based communication network
EP4113940A1 (en) * 2016-10-05 2023-01-04 Convida Wireless, LLC Capability exposure for service instantiation
US10318723B1 (en) * 2016-11-29 2019-06-11 Sprint Communications Company L.P. Hardware-trusted network-on-chip (NOC) and system-on-chip (SOC) network function virtualization (NFV) data communications
CN110268693A (zh) * 2017-02-07 2019-09-20 日本电气株式会社 Vnf包签名系统和vnf包签名方法
CN110324164B (zh) * 2018-03-29 2020-10-16 华为技术有限公司 一种网络切片的部署方法及装置
WO2020252052A1 (en) * 2019-06-10 2020-12-17 Apple Inc. End-to-end radio access network (ran) deployment in open ran (o-ran)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140317261A1 (en) * 2013-04-22 2014-10-23 Cisco Technology, Inc. Defining interdependent virtualized network functions for service level orchestration
CN104253866A (zh) * 2014-09-20 2014-12-31 华为技术有限公司 虚拟网络功能网元的软件部署方法、系统及相关设备
CN104348873A (zh) * 2013-08-05 2015-02-11 中兴通讯股份有限公司 虚拟网元自动装载及虚拟机ip地址获取的方法与系统

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429630B2 (en) * 2005-09-15 2013-04-23 Ca, Inc. Globally distributed utility computing cloud
WO2015031512A1 (en) * 2013-08-27 2015-03-05 Huawei Technologies Co., Ltd. System and method for mobile network function virtualization
US20160212012A1 (en) * 2013-08-30 2016-07-21 Clearpath Networks, Inc. System and method of network functions virtualization of network services within and across clouds
US9760428B1 (en) * 2013-12-19 2017-09-12 Amdocs Software Systems Limited System, method, and computer program for performing preventative maintenance in a network function virtualization (NFV) based communication network
US9813335B2 (en) * 2014-08-05 2017-11-07 Amdocs Software Systems Limited System, method, and computer program for augmenting a physical system utilizing a network function virtualization orchestrator (NFV-O)
US9853869B1 (en) * 2015-01-27 2017-12-26 Amdocs Software Systems Limited System, method, and computer program for automatically instructing a virtual network function (VNF) to operate in accordance with one of a plurality of function definitions
US9430262B1 (en) * 2013-12-19 2016-08-30 Amdocs Software Systems Limited System, method, and computer program for managing hierarchy and optimization in a network function virtualization (NFV) based communication network
US10664297B2 (en) * 2014-02-24 2020-05-26 Hewlett Packard Enterprise Development Lp Activating pre-created VNFCs when a monitored performance level of a VNF exceeds a maximum value attainable by the combined VNFCs that form a VNF
EP3207678B1 (en) * 2014-10-16 2018-09-19 Telefonaktiebolaget LM Ericsson (publ) Lawful intercept management modules and methods for li configuration of an internal interception function in a cloud based network
US9946614B2 (en) * 2014-12-16 2018-04-17 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for managing faults in a virtual machine network
EP3257212A1 (en) * 2015-02-13 2017-12-20 Nokia Solutions and Networks Oy Security mechanism for hybrid networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140317261A1 (en) * 2013-04-22 2014-10-23 Cisco Technology, Inc. Defining interdependent virtualized network functions for service level orchestration
CN104348873A (zh) * 2013-08-05 2015-02-11 中兴通讯股份有限公司 虚拟网元自动装载及虚拟机ip地址获取的方法与系统
CN104253866A (zh) * 2014-09-20 2014-12-31 华为技术有限公司 虚拟网络功能网元的软件部署方法、系统及相关设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NFV ETSI ISG.: "Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance", ETSI GS NFV-SEC 003 V1.1.1, 31 December 2014 (2014-12-31), XP014216283 *
See also references of EP3249882A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019029327A1 (zh) * 2017-08-08 2019-02-14 华为技术有限公司 网络功能服务的发现方法及设备
US11258822B2 (en) 2017-08-08 2022-02-22 Huawei Technologies Co., Ltd. Network function service discovery method and device
US20200313981A1 (en) * 2017-09-29 2020-10-01 Orange Method and device for processing a network service instantiation request

Also Published As

Publication number Publication date
CN106105154B (zh) 2019-10-22
EP3249882A1 (en) 2017-11-29
BR112017017491A2 (pt) 2018-06-26
CN106105154A (zh) 2016-11-09
US20170373939A1 (en) 2017-12-28
EP3249882A4 (en) 2018-02-21

Similar Documents

Publication Publication Date Title
WO2016127436A1 (zh) 数据上载的方法、装置及系统
CN105871838B (zh) 一种第三方账号的登录控制方法及用户中心平台
US9191384B2 (en) Maintaining privacy in a multi-tenant cloud service participating in a federated identity platform
JP6574168B2 (ja) 端末識別方法、ならびにマシン識別コードを登録する方法、システム及び装置
EP3694175B1 (en) System and method for delegating authority through coupled devices
WO2016180171A1 (zh) 一种信任登录方法和装置
US20170048225A1 (en) Method, Apparatus, and System for Secure Authentication
WO2016173199A1 (zh) 一种移动应用单点登录方法及装置
US20140041002A1 (en) Secure Access Method, Apparatus And System For Cloud Computing
CN105007280A (zh) 一种应用登录方法和装置
CN111490981B (zh) 访问管理方法、装置、堡垒机及可读存储介质
KR20170037612A (ko) 단말 식별자들을 용이하게 하는 방법 및 시스템
TW201525755A (zh) 合法性驗證方法、中間伺服器及電腦可讀取儲存介質
CN107800678A (zh) 检测终端异常注册的方法及装置
US9178869B2 (en) Locating network resources for an entity based on its digital certificate
US20180063101A1 (en) Keys for encrypted disk partitions
WO2016131171A1 (zh) 一种针对vnf包进行操作的方法及装置
CN110581824A (zh) 基于多个微信公众号快速登录管理系统
US20230261882A1 (en) Image Management Method and Apparatus
CN111339524A (zh) 多租户权限控制方法及装置
CN113129008B (zh) 数据处理方法、装置、计算机可读介质及电子设备
CN114554251B (zh) 多媒体数据的请求方法和装置、存储介质及电子装置
CN105516134A (zh) 一种系统集成的认证方法及系统
CN115412294A (zh) 基于平台服务的访问方法及装置、存储介质、电子设备
WO2022062688A1 (zh) 消息推送方法、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15881598

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2015881598

Country of ref document: EP

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112017017491

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112017017491

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20170815